CN102481956A - Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same - Google Patents

Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same Download PDF

Info

Publication number
CN102481956A
CN102481956A CN2010800384586A CN201080038458A CN102481956A CN 102481956 A CN102481956 A CN 102481956A CN 2010800384586 A CN2010800384586 A CN 2010800384586A CN 201080038458 A CN201080038458 A CN 201080038458A CN 102481956 A CN102481956 A CN 102481956A
Authority
CN
China
Prior art keywords
data
hashed value
blocks
real
iad
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010800384586A
Other languages
Chinese (zh)
Other versions
CN102481956B (en
Inventor
李东勋
金允圭
金凡韩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industry Academy Collaboration Foundation of Korea University
Original Assignee
Industry Academy Collaboration Foundation of Korea University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industry Academy Collaboration Foundation of Korea University filed Critical Industry Academy Collaboration Foundation of Korea University
Publication of CN102481956A publication Critical patent/CN102481956A/en
Application granted granted Critical
Publication of CN102481956B publication Critical patent/CN102481956B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62DMOTOR VEHICLES; TRAILERS
    • B62D41/00Fittings for identifying vehicles in case of collision; Fittings for marking or recording collision areas
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • G07C5/085Registering performance data using electronic data carriers
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01DMEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
    • G01D9/00Recording measured values
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • G07C5/085Registering performance data using electronic data carriers
    • G07C5/0858Registering performance data using electronic data carriers wherein the data carrier is removable
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Abstract

The present invention relates to a vehicle black box technique and provides the advantage of guaranteeing the integrity of vehicle data stored in a black box in real time by forming input data streams as block data and performing a signature using a signature key and nested hashing. In addition, since each vehicle black box includes a reliable unique signature key, the present invention provides the advantage of supporting a non-repudiation function. Furthermore, the present invention provides the advantage of supporting an error correction function through a unique algorithm for generating integrity verification data even when an error occurs from the vehicle data.

Description

Real-time vehicle data integrity ensuring equipment and method and vehicle are used the black box system
Technical field
The present invention relates to a kind of vehicle with the black box technology; In more detail; Relate to and not only ensure the integraty of real-time storage in the vehicle data of black box, and support to prevent to deny and the vehicle data integrity ensuring device and method of wrong restore funcitons with utilize its vehicle to use the black box system.
Background technology
Originally, so-called black box (Black Box) was meant flightlog (Flight Data Recorder; FDR) and even flight image store device (Airborne Video Recorder; AVR).The height of aircraft in this black box record-setting flight, temperature, running state, operator's compartment internal sound, with the Content of Communication of control tower etc., be used for when aircraft accident takes place, finding out accident causation, the reproduction accident purpose of situation at that time.
But; Because nearest automobile generally rate sharply increases; Thing followed car accedent rate also sharply increases, and therefore, vehicle is presented the trend that increases sharply with concern and research, the exploitation of black box (Vehicle Black Box or Event Data Recorder).
In fact, the vehicle on the market with black box year sales achievement be about 66000 (about 12,000,000,000 won) in 2008, expectation will be increased to more than about 100,000 (about 20,000,000,000 won) this year in 2009.In addition,, build Ministry of Communication, Agency For Tech And Standards, telematics association and formulating vehicle and use the black box relevant criterion, estimate with Commercial Motor Vehicle be that the center realizes that vehicle will make laws in 2011 with the bill of black box installation obligationization in Korea S.
This trend is global, for example with regard to the U.S., and the federal (DOT of Ministry of Communication; Depart of Transportation) 2004 issue black box standard cases, (the NHTSA of expressway safety association; National Highway Traffic Safety Administration) issue is recommended to install the advice case of vehicle with black box additional, AIAE American institute of automobile engineers (SAE on the import lilliput car home from September, 2008; Society of Automotive Engineers) and U.S. electric and the (IEEE of Electronic Engineering Association; Institute of Electrical and Electronics Engineers) issued vehicle with black box standard case.In addition, with regard to Europe, (the UNECE of UNECE; United Nations Economic Commission for Europe) uses the black box standardization effort, (the EU of European Union as abrupt deceleration vehicle in the mutual import and export restriction of mandatory term; European Union) confirmed from requirement in 2009 to EU member state in all vehicles install the bill of black box additional.In addition, with regard to Japan, began a part of vehicle obligation is installed black box, on the Chinese side, carried out all vehicle obligatioies digital run recording equipment is installed in 2008 from 2008.
Along with this worldwide trend, also increasingly high to the care of the safety problem of canned data in the black box.Because if canned data can be forged and even alters by the hacker easily in the black box, so,, can't admit legal argument effectiveness etc. because the worry that data are distorted causes data reliability to descend, can't reach the purpose of black box technology.
But original vehicle only focuses on inside, the external sense data of collection, store car with the black box technology, or passes through canned data reproduction accident conditions in the black box.That is, there is the extremely thin weak problem of forgery, adulterium to black box data in the face of the hacker in original technology.
Particularly with regard to the vehicle data of storing in the black box,, require to ensure in real time the technology of data integrity (Data Integrity) because real-time collecting and characteristic stored are forgery, the adulterium that prevents vehicle data.But there is the problem of the solution of support vehicles data integrity in real time that do not propose as yet in original technology.
And, original technological existence can't provide about canned data in the black box prevent deny that (Non-repudiation), mistake recover problems such as (Error Recovery) function.
Summary of the invention
Technical matters
First technical task that the present invention will solve provides a kind of integraty that is stored in the vehicle data in the black box that not only ensures in real time, and, support to prevent to deny and the vehicle data integrity ensuring device of wrong restore funcitons.
Second technical task that the present invention will solve provides a kind of integraty that is stored in the vehicle data in the black box that not only ensures in real time, and, support to prevent to deny and the vehicle data integrity ensuring method of wrong restore funcitons.
The 3rd technical task that the present invention will solve provides a kind of vehicle of said vehicle data integrity ensuring device and method that utilized and uses the black box system.
Technical scheme
For solving aforesaid first technical task, the present invention provides a kind of real-time vehicle data integrity ensuring equipment, comprising: blocks of data generation portion is divided into the input traffic about the vehicle sensory information blocks of data of predetermined size; IAD generation portion to the initial blocks of data of said input traffic, carries out the signature based on signature key (signing key), generates data origin authentication (Initial Authentication Data; IAD); The 1st hash portion generates the 1st hashed value about each said blocks of data of cutting apart successively, wherein, carries out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data; The 2nd hash portion through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data.Wherein, said the 1st hash portion utilizes said IAD value as the 1st hashed value about said initial blocks of data.
According to one embodiment of the invention, said IAD generation portion utilizes the signature key of being provided by third party's trust authority (Third Trust Party) to generate said IAD.
According to one embodiment of the invention, said IAD generation portion is by built-in said signature key and ensure that the smart card (Smart Card) of the safety of said signature key constitutes.
According to one embodiment of the invention, said IAD generation portion comprises the memory section of the said IAD of said signature key of storage and generation.
According to one embodiment of the invention; Said real-time vehicle data integrity ensuring equipment also comprises 1st storage part of storage by the 1st hashed value of said the 1st hash portion generation; Said the 1st hash portion utilizes the 1st hashed value about last blocks of data of said the 1st storage portion stores, generates the 1st hashed value about the current block data.
According to one embodiment of the invention, said the 1st storage part is stored as the 1st hashed value about said initial blocks of data with said IAD value.
According to one embodiment of the invention, said the 1st storage part is under the situation of storage about the 1st hashed value of said current block data, and deletion is about the 1st hashed value of said last blocks of data.
According to one embodiment of the invention, said real-time vehicle data integrity ensuring equipment comprises that also storage is about the 2nd storage part by the integrity verification data of each blocks of data of said the 2nd hash portion output.
For solving aforesaid second technical task, the present invention provides a kind of real-time vehicle data integrity support method, and the vehicle of collection and store car sensory information associated vehicle data is with the real-time integraty that ensures said vehicle data of black box, and this method comprises; Blocks of data generates step, will be divided into the blocks of data of predetermined size about the input traffic of vehicle sensory information; IAD generates step, and the initial blocks of data to said input traffic utilizes signature key to sign, and generates data origin authentication (IAD); The 1st hash step generates the 1st hashed value about said each blocks of data of cutting apart successively, wherein, carries out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data; The 2nd hash step through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data.Wherein, said the 1st hash step is to utilize the step of said IAD value conduct about the 1st hashed value of said initial blocks of data.
For solving aforesaid the 3rd technical task; The present invention provides a kind of collection and storage to use the black box system about the vehicle of the vehicle data of the sensory information of vehicle; Comprise: blocks of data generation portion is divided into the input traffic about the vehicle sensory information blocks of data of predetermined size; IAD generation portion to the initial blocks of data of said input traffic, carries out the signature based on signature key, generates data origin authentication (IAD); The 1st hash portion generates the 1st hashed value about said each blocks of data of cutting apart successively, and is to carry out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data; The 2nd hash portion through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data.Wherein, said the 1st hash portion utilizes said IAD value as the 1st hashed value about said initial blocks of data.
According to one embodiment of the invention, said IAD generation portion by built-in by the granting of third party's trust authority signature key and ensure that the smart card of the safety of said signature key embodies.
According to one embodiment of the invention, said vehicle comprises also that with the black box system storage is about the data store by the integrity verification data of each blocks of data of said the 2nd hash portion output.
According to one embodiment of the invention, said data store is also stored the said blocks of data corresponding to said integrity verification data.
The invention effect
The present invention generates blocks of data with input traffic, carries out signature and eclipsed form hash based on signature key, thereby the advantage of the vehicle data integraty of storing in the real-time guarantee black box is provided.
In addition, each vehicle has the unique signature key with reliability with black box, prevents to deny the advantage of function thereby provide support.
And, through generating the intrinsic algorithm of integrity verification data, even the advantage of under the situation that vehicle data makes a mistake, also supporting wrong restore funcitons is provided.
Description of drawings
Fig. 1 shows the block diagram of real-time vehicle data integrity ensuring equipment according to an embodiment of the invention;
Fig. 2 shows the diagram of circuit of real-time vehicle data integrity support method according to an embodiment of the invention;
Fig. 3 is for showing according to the blocks of data of one embodiment of the invention generation and the accompanying drawing of integrity verification data;
Fig. 4 is for showing the accompanying drawing of the calculation value that generates according to one embodiment of the invention;
Fig. 5 is for showing the accompanying drawing of carrying out a hash and generating the calculation value under the integrity verification data cases;
Fig. 6 shows that vehicle is with the block diagram of black box system according to an embodiment of the invention.
Preferred forms
The present invention includes: blocks of data generation portion is divided into the input traffic about the vehicle sensory information blocks of data of predetermined size; IAD generation portion to the initial blocks of data of said input traffic, carries out the signature based on signature key (signing key), generates data origin authentication (Initial Authentication Data; IAD); The 1st hash portion generates the 1st hashed value about said each blocks of data of cutting apart successively, and is to carry out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data; The 2nd hash portion through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data; And said the 1st hash portion utilizes said IAD value as the 1st hashed value about said initial blocks of data.
The present invention includes: blocks of data generates step, will be divided into the blocks of data of predetermined size about the input traffic of vehicle sensory information; IAD generates step, and the initial blocks of data to said input traffic utilizes signature key to sign, and generates data origin authentication IAD; The 1st hash step generates the 1st hashed value about said each blocks of data of cutting apart successively, and is to carry out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data; The 2nd hash step through said the 1st hashed value about the current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data; And said the 1st hash step is to utilize the step of said IAD value conduct about the 1st hashed value of said initial blocks of data.
The specific embodiment
Below, for the technical scheme of clear and definite technical task of the present invention, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.But, in explanation process of the present invention, in the time main idea of the present invention can being obscured on the contrary, omit its related description to the explanation of related known technology.In addition, after the term stated be to consider function in the present invention and the term that defines, may be different because of user, utilization person's etc. intention or convention etc.Therefore, its definition should be that the basis determines with the comprehensive content in this specification sheets.
Fig. 1 shows the block diagram of real-time vehicle data integrity ensuring equipment according to an embodiment of the invention.
Fig. 2 shows the diagram of circuit of real-time vehicle data integrity support method according to an embodiment of the invention.
Like Fig. 1 and shown in Figure 2, said real-time vehicle data integrity ensuring equipment 100 comprises blocks of data generation portion 110, the 120, the 1st hash portion 130 of IAD generation portion and the 2nd hash portion 140, can also comprise data store 150.
At first, in step S210, said blocks of data generation portion 110 will be divided into the blocks of data of predetermined size about the input traffic of vehicle sensory information.This is based in order to handle the technology consideration about the input traffic of vehicle sensory information in real time.
Then, in step S220, said IAD generation portion 120 utilizes signature key (signing key to the initial blocks of data of said input traffic; Sk) carry out signature, generate data origin authentication (Initial Authentication Data; IAD).In one embodiment, said IAD generation portion 120 can and ensure that the smart card (Smart Card) of the safety of said signature key sk embodies by built-in said signature key sk.This smart card is embedded with the semiconductor chip that has carried IC memory device and central processing unit CPU, the characteristic that the security functions such as management that therefore have encryption, the authentication that inserts object, data memory are outstanding, stability is high, can not forge.At this moment, when said smart card 120 can or be registered vehicle when purchase possesses the black box of said integrity ensuring device 100, from third party's trust authority (TTP; Third Trust Party) obtains to provide, for example obtain to provide from government bodies.Said signature key sk distributes to said integrity ensuring device 100 uniquely and even possesses its black box, when providing said smart card 120, can together obtain to provide from said third party's trust authority.In one embodiment, at said integrity ensuring device 100 and even possess in its black box and possess communication module (not shown), can obtain to provide said signature key sk from said third party's trust authority.In addition, said IAD generation portion 120 comprises the memory section with safety (for example, the IC memory device of smart card) of the IAD of the signature key sk that stores said granting and said generation.
Then; At step S230 to step S260; Said the 1st hash portion 130 generates the 1st hashed value about said each blocks of data of cutting apart successively; And be to carry out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, dj generates the 1st hashed value about said current block data.For this reason, said integrity ensuring device 100 can also comprise 1st storage part 152 of storage by the 1st hashed value of said the 1st hash portion 130 generations.
It should be noted that said the 1st hash portion 130 under the situation of having imported said initial blocks of data, will use the value of the said IAD that generates by said IAD generation portion 120 to replace as the 1st hashed value about said initial blocks of data.Its reason is because with regard to said initial blocks of data, do not have last blocks of data.
Relate more specifically to, in step S230, said the 1st hash portion 130 in step S240, is stored in said the 1st storage part 152 to said IAD value as the 1st hashed value about said initial blocks of data under the situation of having imported said initial blocks of data.And; In step S230; Under the situation of the blocks of data of said the 1st hash portion 130 after having imported second; In step S250, carry out hash (hashing), generate the 1st hashed value about said current block data through the blocks of data value of current input is connected with the 1st hashed value about last blocks of data (concatenation).
And said the 1st hash portion 130 will be stored in said the 1st storage part 152 about the 1st hashed value of said current block data, when the 1st hashed value that generates about next blocks of data, as the 1st hashed value about said last blocks of data.At this moment, in step S230, said the 1st storage part 152 is deleted the 1st hashed value S260 about last blocks of data of storage in said the 1st storage part 152 under the situation of having stored about the 1st hashed value of current block data.For example; Generating about the 1st hashed value of second blocks of data or will be stored in about the 1st hashed value of second blocks of data under the situation of said the 1st storage part 152; About last blocks of data; That is, from said the 1st storage part 152, deleting as said IAD value about the 1st hashed value of initial blocks of data.In addition, having generated about the 1st hashed value of the 3rd blocks of data or will being stored in about the 1st hashed value of the 3rd blocks of data under the situation of said the 1st storage part 152, from said the 1st storage part 152, delete the 1st hashed value about second blocks of data.Because memory device or data space such as said the 1st storage part 152 are general easy of hacker's visit, therefore the said practice is based on the technology consideration for important informations such as said IAD can be leaked necessarily.
Then, in step S270, said the 2nd hash portion 140 generates the 2nd hashed value through the 1st hashed value about said current block data is carried out hash once more, and said the 2nd hashed value is output as the integrity verification data about said current block data.At this moment, in step S280, said integrity ensuring device 100 can also comprise the 2nd storage part 154, can store the integrity verification data about each blocks of data of being exported by said the 2nd hash portion 140.
Said integrity ensuring device 100 is under the situation S290 that has imported next blocks of data, and said repeatedly step S250 is to said step S280.
In Fig. 1, said the 1st storage part 152 and said the 2nd storage part 154 independent embodiments according to embodiment, also can be embodied by mono-storage part 150.
In Fig. 3, the blocks of data and the integrity verification data that generate according to one embodiment of the invention have been shown.
As shown in Figure 3, the present invention will be divided into blocks of data (the Block Data of predetermined size about the input traffic 300 of vehicle sensory information; BD n), generate corresponding to said each blocks of data BD of cutting apart nAdditional data (Additional Data; AD n) 310, that is, and the integrity verification audio data AD n
In Fig. 4, shown the calculation value that generates according to one embodiment of present invention.
Said integrity verification audio data AD as shown in Figure 4, as to generate according to one embodiment of present invention nGenerate by following steps.
1, initial blocks of data BD 1Get into through the input of said IAD generation portion (for example, smart card 120), be utilized said signature key sk signature and output.Said signature value Sign Sk(BD 1) be defined as IAD (Initial Authentication Data).
2, IAD is stored in the memory device with safety of said IAD generation portion 120.
3, conduct is about said BD 1The 1st hashed value h 1, utilize said IAD value, as about said BD 1The integrity verification audio data AD 1, storage is about said BD 1The 2nd hashed value h 1', that is, said IAD is carried out the value h (IAD) of hash.
4, conduct is about the second blocks of data BD 2The 1st hashed value h 2, storage is with said IAD and BD 2Value h (the IAD||BD that is connected and carries out hash 2).
5, said IAD is at said h 2After the generation, deleted from storage part.
6, conduct is about said BD 2The 2nd hashed value h 2', storage is to said h 2Carry out the value h (h of hash 2).
7, promptly, as about said BD 2The integrity verification audio data AD 2, store said h 2'.
8, conduct is about the 3rd blocks of data BD 3The 1st hashed value h 3, storage is with said h 2And BD 3Value h (the h that is connected and carries out hash 2|| BD 3).
9, said h 2At said h 3After the generation, deleted from storage part.
10, conduct is about said BD 3The 2nd hashed value h 3', storage is to said h 3Carry out the value h (h of hash 3).
11, promptly, as about said BD 3The integrity verification audio data AD 3, store said h 3'.
12, utilize said 8 to 11 process, continue to generate and store about blocks of data BD nThe integrity verification audio data AD n
In the present invention, for generating each integrity verification audio data AD nAnd carry out hash twice, this is based on provides safer, the required technology of real time data integrity ensuring technology is considered efficiently.
In Fig. 5, shown and carried out a hash and generate the calculation value under the integrity verification data cases.
As shown in Figure 5, only generating the integrity verification audio data AD through a hash nSituation under, for example, with h 2Be stored as about the second blocks of data BD 2The integrity verification audio data AD 2Situation under, though the hacker can't generate to said AD 2, but from about the 3rd blocks of data BD 3The integrity verification audio data AD 3Play the 1st hashed value h of last blocks of data N-1Expose, for example, h 2Expose the problem that the hacker can be generated.
On the other hand, if said IAD level is coupled to said BD 2Blocks of data BD afterwards n,, only also can ensure data integrity through a hash from logic.But, in this case, just produced on the memory device of storage part the result who continues to expose said IAD, make the hacker AD that can copy and even alter nThe problem of value.
Therefore, the present invention is generating each integrity verification audio data AD for preventing said problem nThe aspect through carrying out hash twice, ensures data integrity.Wherein, it should be noted that aspect actual embodiment, but the calculation of hash function at high speed, influence calculation performance hardly.
In Fig. 6, shown that with block diagram the vehicle of one embodiment of the invention uses the black box system.
As shown in Figure 6, said vehicle can comprise the sensor part 610 of sensing vehicle interior and exterior multiple information and collect and store the black box 630 by the information of said sensor part 610 sensings with black box system 600.
Said sensor part 610 can comprise the various sensors that are used for sensing vehicle interior and exterior multiple information.For example, can comprise acceleration pick-up 616 and the angular velocity sensor 618 of the audio sensor 614, the variation/rotation of perception Vehicle Speed etc. of the image sensor 612 of taking the vehicle periphery image, registration of vehicle inner/outer sound, the shock transducer 620 whether the perception vehicle collides etc.
Said black box 630 can comprise the integrity ensuring portion 100 of the integraty that ensures the input data the input interface 632 that is converted into the data flow of digital morphological by the transducing signal of said sensor part 610 perception, in real time and the data store 634 of storage data.
The detailed inscape of said integrity ensuring portion 100 and action are with reference to said explanation about real-time vehicle data integrity ensuring equipment 100 of the present invention.
As stated, the said IAD generation portion 120 of said integrity ensuring portion 100 can be made up of built-in signature key sk that is provided by third party's trust authority (TTP) and the smart card (Smart Card) that ensures the safety of said signature key sk.At this moment, the signature value IAD that is generated by said smart card 120 can only obtain in said integrity ensuring portion 100, even the vehicle possessor also can't arbitrarily obtain.Therefore, have only said third party's trust authority (TTP) of providing said signature key sk just to have signature verification corresponding to said signature key sk, have only said third party's trust authority (TTP) could carry out the data integrity verification with public keys (pk).For example; After said third party's trust authority (TTP) derives said IAD value from said smart card; Utilization is carried out signature verification corresponding to the said public keys (pk) of said signature key sk, after said signature verification is passed through, according to the said integrity verification audio data AD of said signature nThe order that generative process is identical is carried out said blocks of data BD nHash, through the value AD that relatively generates n' whether with said integrity verification audio data AD nValue consistent, can verify the integraty of the data of generation.
Said data store 634 is with said blocks of data BD nBe stored as corresponding to said integrity verification audio data AD nSource data.In one embodiment, both can be integrated in said data store 634 said the 1st storage part 152 of said integrity ensuring portion 100, said the 2nd storage part 154 or the said the 1st and the 2nd storage part 152,154, are embodied by the mono-storage part.In addition, in one embodiment, consider the memory capacity of said data store 634, can utilize the FIFO mode to limit the amount of canned data in the said data store 634.That is, can be when deleting storage data remote, the data of the new input of storage.At this moment, said data store 634 can be presented as that under the situation of being represented vehicle emergency situations such as accident, stolen, fault by the sensory information of said sensor part 610 perception canned data is irrespectively preserved with storage constantly always under corresponding situation.
In addition, in one embodiment, said integrity ensuring portion 100 can be at electronic control package (the Electronic Control Unit of control vehicle with the black box of black box; ECU, not shown) on, utilize System on Chip/SoC (system on chip) technology to embody, make the electronic control package of said black box can ensure the integraty of said vehicle in real time with the vehicle data of storing in the black box.If utilize the mono-microprocessor chip to embody the present invention, have the size that can reduce various systems, can simplify assembling process, can save advantage such as manufacturing expense.
In addition, according to embodiment, the present invention can be in can the recording medium by computer interpretation, the program code embodied that can read with computing machine.When the present invention passed through running software, inscape of the present invention was the code segment of the required operation of operation.In addition, but program or code segment can be stored in the treater interpretation medium of computing machine, perhaps through transmission medium or communication network, utilize the computer data signal that combines with carrier wave to transmit.
But computing machine interpretation recording medium comprises that storage can be by the recording device of all kinds of the data of computer system reads.For example, but computing machine interpretation recording medium can comprise ROM, RAM, CD-ROM, tape, floppy disk, light data storage apparatus etc.In addition, but computing machine interpretation recording medium can be distributed in through network bonded assembly computer system, with the code of distribution mode storage, operation embodied on computer readable.
Following surface analysis remarkable result of the present invention.
The present invention ensures about the real-time integraty of vehicle with canned data in the black box.That is, in Fig. 4, said AD 1Be the value of the signature value IAD that utilizes said signature key sk to generate being carried out hash, therefore, the hacker can't be known the said signature key sk and the said IAD of storage in the said smart card 120, can't generate said AD 1Said IAD value has only third party's trust authority (TTP) to derive.In addition, owing to can't generate said IAD, so can't generate said h 2And h 2', this means AD 2Also can't generate.In addition, owing to can't generate said h 2So, can't generate h 3And h 3', this means AD 3Also can't generate.In like manner, make the hacker can't generate later AD nIn addition, because the characteristic of hash function, thereby can't know as h n' trade-show and penetrate the h of (Pre-image) value nValue is so can not forge intermediate value.
In addition, the present invention is owing to make each black box system have unique signature key, thereby supports to prevent to deny function.
In addition, the present invention is in said integrity verification audio data AD nAfter the storage, even under situation about making a mistake, also support wrong restore funcitons because of external impact, electrical error, transmission obstacle etc.That is, even at AD N-1Make a mistake in the value and can't verify AD nThe situation of integraty under, also can know the IAD value, therefore, the integraty of all the other all pieces can be verified.
And the present invention is at said blocks of data BD nAfter the storage,,, then support the mistake of part to recover if input traffic is the data flow about video data even under situation about making a mistake.That is, reply is worked as at particular block data BD nIn when making a mistake, can't carry out the situation with the integrity verification that after this blocks of data is relevant, sign to each I-Frame (Intra frame) of said video data.The signature value that so generates is independent of the integrity verification audio data AD nStore.Can decipher after the said I-Frame, convert picture into, so, even in said video data, make a mistake, also can verify integraty to the image picture that stops of per second.
As stated, the present invention provides not only the integraty that ensures the vehicle data that is stored in black box in real time, and supports to prevent to deny and the advantage of wrong restore funcitons.
Above with reference to embodiment, describe the present invention.But the person of ordinary skill in the field is understood that in the scope of the technological thought that does not break away from internal of the present invention the present invention can be embodied by the form of distortion.Therefore, disclosed embodiment is used for limiting, but should take in from detailed angle.That is, real technical scope of the present invention comes across in subsidiary said claims, and all differences in impartial with it scope should be interpreted as and be contained in the present invention.
Industrial applicability
The present invention can be embodied by the module of vehicle with black box.

Claims (15)

1. a real-time vehicle data integrity ensuring equipment is characterized in that, comprises;
Blocks of data generation portion is divided into the input traffic about the vehicle sensory information blocks of data of predetermined size;
IAD generation portion to the initial blocks of data of said input traffic, carries out the signature based on signature key (signing key), generates data origin authentication (Initial Authentication Data; IAD);
The 1st hash portion generates the 1st hashed value about each said blocks of data of cutting apart successively, wherein, carries out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data;
The 2nd hash portion through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data;
Wherein, said the 1st hash portion utilizes said IAD value as the 1st hashed value about said initial blocks of data.
2. real-time vehicle data integrity ensuring equipment according to claim 1 is characterized in that,
Said IAD generation portion utilizes the signature key of being provided by third party's trust authority (Third Trust Party) to generate said IAD.
3. real-time vehicle data integrity ensuring equipment according to claim 2 is characterized in that,
Said IAD generation portion is by built-in said signature key and ensure that the smart card (Smart Card) of the safety of said signature key constitutes.
4. real-time vehicle data integrity ensuring equipment according to claim 3 is characterized in that,
Said IAD generation portion comprises the memory section of the said IAD of said signature key of storage and generation.
5. real-time vehicle data integrity ensuring equipment according to claim 1 is characterized in that,
Said real-time vehicle data integrity ensuring equipment also comprises 1st storage part of storage by the 1st hashed value of said the 1st hash portion generation,
Said the 1st hash portion utilizes the 1st hashed value about last blocks of data of said the 1st storage portion stores, generates the 1st hashed value about the current block data.
6. real-time vehicle data integrity ensuring equipment according to claim 5 is characterized in that,
Said the 1st storage part is stored as the 1st hashed value about said initial blocks of data with said IAD value.
7. real-time vehicle data integrity ensuring equipment according to claim 6 is characterized in that,
Said the 1st storage part is under the situation of storage about the 1st hashed value of said current block data, and deletion is about the 1st hashed value of said last blocks of data.
8. real-time vehicle data integrity ensuring equipment according to claim 1 is characterized in that,
Said real-time vehicle data integrity ensuring equipment comprises that also storage is about the 2nd storage part by the integrity verification data of each blocks of data of said the 2nd hash portion output.
9. real-time vehicle data integrity support method is collected and the vehicle of store car sensory information associated vehicle data ensures the integraty of said vehicle data in real time with black box, and this method comprises;
Blocks of data generates step, will be divided into the blocks of data of predetermined size about the input traffic of vehicle sensory information;
IAD generates step, to the initial blocks of data of said input traffic, utilizes signature key (signing key) to sign, and generates data origin authentication (Initial Authentication Data; IAD);
The 1st hash step generates the 1st hashed value about said each blocks of data of cutting apart successively, wherein, carries out hash through the value of current block data is connected with the 1st hashed value about last blocks of data, generates the 1st hashed value about said current block data;
The 2nd hash step through the 1st hashed value about said current block data is carried out hash, generates the 2nd hashed value, and said the 2nd hashed value is output as the integrity verification data about said current block data;
Wherein, said the 1st hash step is to utilize the step of said IAD value conduct about the 1st hashed value of said initial blocks of data.
10. real-time vehicle data integrity support method according to claim 9 is characterized in that,
It is to utilize the signature key of being provided by third party's trust authority (Third Trust Party) to generate the step of said IAD that said IAD generates step.
11. real-time vehicle data integrity support method according to claim 9 is characterized in that,
Said real-time vehicle data integrity support method also comprises 1st storing step of storage by the 1st hashed value of said the 1st hash step generation,
Said the 1st hash step is the 1st hashed value of utilizing by said the 1st storing step storage about last blocks of data, generates the step about the 1st hashed value of current block data.
12. real-time vehicle data integrity support method according to claim 11 is characterized in that,
Said the 1st storing step is to be stored as the step about the 1st hashed value of said initial blocks of data to said IAD value.
13. real-time vehicle data integrity support method according to claim 12 is characterized in that,
Said the 1st storing step is that deletion is about the step of the 1st hashed value of said last blocks of data under the situation of storage about the 1st hashed value of said current block data.
14. real-time vehicle data integrity support method according to claim 9 is characterized in that,
Said real-time vehicle data integrity support method comprises that also storage is about the 2nd storing step by the integrity verification data of each blocks of data of said the 2nd hash step output.
15. but a computing machine interpretation recording medium has write down with any one required program of method in the computer run claim 9 to 14.
CN201080038458.6A 2009-08-31 2010-08-30 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same Expired - Fee Related CN102481956B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR10-2009-0081278 2009-08-31
KR1020090081278A KR101072277B1 (en) 2009-08-31 2009-08-31 Apparatus and method for guaranteeing data integrity in real time, and black box system using thereof
PCT/KR2010/005844 WO2011025331A2 (en) 2009-08-31 2010-08-30 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same

Publications (2)

Publication Number Publication Date
CN102481956A true CN102481956A (en) 2012-05-30
CN102481956B CN102481956B (en) 2014-07-30

Family

ID=43628645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080038458.6A Expired - Fee Related CN102481956B (en) 2009-08-31 2010-08-30 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same

Country Status (7)

Country Link
US (1) US8973152B2 (en)
JP (1) JP5274713B2 (en)
KR (1) KR101072277B1 (en)
CN (1) CN102481956B (en)
DE (1) DE112010003503T5 (en)
RU (1) RU2500027C2 (en)
WO (1) WO2011025331A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102998958A (en) * 2011-09-09 2013-03-27 三星电子株式会社 Crum chip of a user changeable component and image forming device for communicating mutually, and method thereof
CN103593625A (en) * 2012-08-14 2014-02-19 金峰顺泰知识产权有限公司 Data storage method and device
CN107004374A (en) * 2016-01-19 2017-08-01 株式会社益善 Flight training support system, portable terminal device and flight training Zhi Yuanyong programs
CN107423614A (en) * 2012-12-24 2017-12-01 爱思打印解决方案有限公司 Customer's replaceable units monitors chip and imaging device and its method
US9924071B2 (en) 2011-09-09 2018-03-20 S-Printing Solution Co., Ltd. Crum chip and image forming device for authentication and communication, and methods thereof
CN111713123A (en) * 2018-02-20 2020-09-25 西门子股份公司 Control unit and method for the manipulation-protected detection of operating-safety-relevant integrity monitoring data

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8676151B2 (en) * 2010-10-19 2014-03-18 Guardity Technologies, Inc. Detecting a transport emergency event and directly enabling emergency services
KR101105205B1 (en) * 2011-09-05 2012-01-13 주식회사 아나스타시스 An apparatus and a method of processing data for guaranteeing data integrity and confidentiality in real time, and black box system using thereof
KR101957889B1 (en) 2011-12-20 2019-03-14 에이치피프린팅코리아 유한회사 Image forming apparatus for using consumable unit and method for certifying the consumable unit
KR101441527B1 (en) * 2012-05-31 2014-09-17 주식회사 코아로직 Method and apparatus for managing and verifying traveling information of car, and system using thereof
KR101443508B1 (en) * 2013-03-14 2014-09-23 한양대학교 에리카산학협력단 Method and system of data integrity verification for cloud computing
US9865102B2 (en) 2013-04-11 2018-01-09 The University Of Tulsa Wheeled vehicle event data recorder forensic recovery and preservation system
SE537173C2 (en) * 2013-06-12 2015-02-24 Scania Cv Ab System and method of communication between vehicle units in a vehicle system
WO2015024603A1 (en) * 2013-08-23 2015-02-26 Nec Europe Ltd. Method and system for authenticating a data stream
WO2015075578A1 (en) * 2013-11-19 2015-05-28 Koninklijke Philips N.V. Authentication for an image or video
CN103700390A (en) * 2013-12-26 2014-04-02 天津市中环华祥电子有限公司 Storage device for vehicle-mounted black box
KR101593008B1 (en) * 2014-10-08 2016-02-12 재단법인 다차원 스마트 아이티 융합시스템 연구단 Method and system for generating integrity verification data
DE102015200955A1 (en) * 2015-01-21 2016-07-21 Continental Teves Ag & Co. Ohg Method for processing a vehicle-to-X message, electronic control device and storage medium
CN204680071U (en) * 2015-04-30 2015-09-30 乐卡汽车智能科技(北京)有限公司 Bicycle recording apparatus
JP2017069617A (en) * 2015-09-28 2017-04-06 ルネサスエレクトロニクス株式会社 Semiconductor device and image encoding method
KR101843538B1 (en) * 2015-12-16 2018-03-30 엘지전자 주식회사 Driver assistance appratus and method thereof
KR20180049834A (en) * 2016-11-03 2018-05-14 현대오토에버 주식회사 Control device for recovering car control program and Method thereof
KR101866823B1 (en) * 2017-09-15 2018-07-19 에이치피프린팅코리아 주식회사 CRUM chip and image forming device for communicating mutually, and method thereof
KR101945360B1 (en) 2017-10-13 2019-02-07 주식회사 한화 Apparatus and method for of verifying integrity of wireless charge data
KR102084552B1 (en) 2018-01-18 2020-04-23 숭실대학교산학협력단 Apparatus, method and system for verifying integrity of vechicle data based on code
DE102018123217A1 (en) * 2018-09-20 2020-03-26 Audi Ag Data container device with a protective housing and a data storage device arranged in the protective housing and motor vehicle control unit with such a data container device and corresponding motor vehicle
KR102168488B1 (en) * 2018-10-24 2020-10-21 동서대학교 산학협력단 real time image forgery preventing method of black box for vehicle
KR102115436B1 (en) * 2018-11-02 2020-05-27 주식회사 넥스트칩 Method for managing data and memory wrapper performing the method
DE102019217808A1 (en) * 2019-11-19 2021-05-20 Siemens Mobility GmbH Procedure for registering journeys for a railway system and registration participants
EP3860078A1 (en) * 2020-01-31 2021-08-04 Siemens Mobility GmbH Method, devices, railway vehicle, computer program and computer-readable storage medium of storing network information
KR102405093B1 (en) * 2021-12-09 2022-06-07 한화시스템(주) System and method for verifying integrity of unmanned aerial vehicle

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010005804A1 (en) * 1998-02-09 2001-06-28 I-Witness, Inc. Vehicle event data recorder including validation of output
JP2005027059A (en) * 2003-07-02 2005-01-27 Nagoya Industrial Science Research Inst Electronic signature method, electronic signature processing program, and storage medium
KR20050064343A (en) * 2003-12-23 2005-06-29 한국전자통신연구원 Message authentication coding method using the stream cipher
US20050188216A1 (en) * 2003-04-18 2005-08-25 Via Technologies, Inc. Apparatus and method for employing cyrptographic functions to generate a message digest
CN1707450A (en) * 2004-06-08 2005-12-14 侯方勇 Method and apparatus for protecting data confidentiality and integrity in memory equipment
CN1886929A (en) * 2003-11-21 2006-12-27 埃里科斯·皮特索斯 Methods and systems for providing integrity and trust in data management and data distribution processes
US20080022128A1 (en) * 1999-05-28 2008-01-24 Proudler Graeme J System for providing a trustworthy user interface
US20090193211A1 (en) * 2008-01-24 2009-07-30 Broadcom Corporation Software authentication for computer systems

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157317A (en) 1996-12-02 2000-12-05 Kline And Walker Llc Secure communication and control system for monitoring, recording, reporting and/or restricting unauthorized use of vehicle.
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
US20030041242A1 (en) * 2001-05-11 2003-02-27 Sarver Patel Message authentication system and method
JP2002362435A (en) * 2001-06-01 2002-12-18 Mitsubishi Electric Corp Vehicle drive recorder, and data reader thereof
DE10131254A1 (en) * 2001-07-01 2003-01-23 Deutsche Post Ag Procedure for checking the validity of digital postage indicia
US20030084298A1 (en) * 2001-10-25 2003-05-01 Messerges Thomas S. Method for efficient hashing of digital content
US7363494B2 (en) * 2001-12-04 2008-04-22 Rsa Security Inc. Method and apparatus for performing enhanced time-based authentication
JP2004040246A (en) 2002-06-28 2004-02-05 Canon Inc Information processing apparatus, and information processing method
JP4135552B2 (en) * 2003-04-23 2008-08-20 株式会社デンソー Vehicle accident situation storage device
JP4208776B2 (en) * 2004-06-25 2009-01-14 キヤノン株式会社 Print client, network printer and printing system
KR20060111596A (en) * 2006-06-21 2006-10-27 에릭코스 피트소스 Methods and systems for providing integrity and trust in data management and data distribution processes
JP5014035B2 (en) * 2007-09-12 2012-08-29 三菱電機株式会社 Recording apparatus, verification apparatus, reproduction apparatus, and program
JP2009175848A (en) * 2008-01-22 2009-08-06 Nec Corp Drive recorder device, drive recording method, program, and recording medium
KR20090081278A (en) 2008-01-23 2009-07-28 (주)케이티에프테크놀로지스 Portable Terminal Having Antenna Using Parasitic Radiation Element

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010005804A1 (en) * 1998-02-09 2001-06-28 I-Witness, Inc. Vehicle event data recorder including validation of output
US20080022128A1 (en) * 1999-05-28 2008-01-24 Proudler Graeme J System for providing a trustworthy user interface
US20050188216A1 (en) * 2003-04-18 2005-08-25 Via Technologies, Inc. Apparatus and method for employing cyrptographic functions to generate a message digest
JP2005027059A (en) * 2003-07-02 2005-01-27 Nagoya Industrial Science Research Inst Electronic signature method, electronic signature processing program, and storage medium
CN1886929A (en) * 2003-11-21 2006-12-27 埃里科斯·皮特索斯 Methods and systems for providing integrity and trust in data management and data distribution processes
KR20050064343A (en) * 2003-12-23 2005-06-29 한국전자통신연구원 Message authentication coding method using the stream cipher
CN1707450A (en) * 2004-06-08 2005-12-14 侯方勇 Method and apparatus for protecting data confidentiality and integrity in memory equipment
US20090193211A1 (en) * 2008-01-24 2009-07-30 Broadcom Corporation Software authentication for computer systems

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102998958A (en) * 2011-09-09 2013-03-27 三星电子株式会社 Crum chip of a user changeable component and image forming device for communicating mutually, and method thereof
US9924071B2 (en) 2011-09-09 2018-03-20 S-Printing Solution Co., Ltd. Crum chip and image forming device for authentication and communication, and methods thereof
US9927768B2 (en) 2011-09-09 2018-03-27 S-Printing Solution Co., Ltd. Crum chip and image forming device for communicating mutually, and method thereof
US9973658B2 (en) 2011-09-09 2018-05-15 S-Printing Solution Co., Ltd. CRUM chip and image forming device for authentication and communication, and methods thereof
CN102998958B (en) * 2011-09-09 2018-05-18 爱思打印解决方案有限公司 Chip and imaging device and its method are monitored for user's field-replaceable unit of communication
US9977398B2 (en) 2011-09-09 2018-05-22 S-Printing Solution Co., Ltd. CRUM chip and image forming device for communicating mutually, and method thereof
CN103593625A (en) * 2012-08-14 2014-02-19 金峰顺泰知识产权有限公司 Data storage method and device
CN107423614A (en) * 2012-12-24 2017-12-01 爱思打印解决方案有限公司 Customer's replaceable units monitors chip and imaging device and its method
CN107004374A (en) * 2016-01-19 2017-08-01 株式会社益善 Flight training support system, portable terminal device and flight training Zhi Yuanyong programs
CN107004374B (en) * 2016-01-19 2018-02-02 株式会社益善 Flight training support system and portable terminal device
CN111713123A (en) * 2018-02-20 2020-09-25 西门子股份公司 Control unit and method for the manipulation-protected detection of operating-safety-relevant integrity monitoring data

Also Published As

Publication number Publication date
DE112010003503T5 (en) 2012-06-14
RU2500027C2 (en) 2013-11-27
KR20110023412A (en) 2011-03-08
WO2011025331A3 (en) 2011-05-19
US20120222130A1 (en) 2012-08-30
CN102481956B (en) 2014-07-30
KR101072277B1 (en) 2011-10-11
WO2011025331A2 (en) 2011-03-03
RU2012107193A (en) 2013-10-10
JP2013502663A (en) 2013-01-24
US8973152B2 (en) 2015-03-03
JP5274713B2 (en) 2013-08-28

Similar Documents

Publication Publication Date Title
CN102481956B (en) Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using same
US9269203B2 (en) Vehicle component identification and configuration registry reporting system
CN111295862B (en) System and method for cryptographically securing vehicle identity
US8527778B2 (en) Apparatus and method for preventing falsification of black box data
US20090105902A1 (en) Method for providing vehicle accident information and apparatus therefor
KR101105205B1 (en) An apparatus and a method of processing data for guaranteeing data integrity and confidentiality in real time, and black box system using thereof
CN105023310B (en) A kind of travelling data storage method and device, automobile data recorder
KR102358833B1 (en) Method and system for collecting and managing event data which is recorded by vehicle
US9165131B1 (en) Vehicle connector lockout for in-vehicle diagnostic link connector (DLC) interface port
EP2950251A1 (en) Method, apparatus and system for filling out an accident report form
KR101234347B1 (en) Black box service providing method for vehicles enhanced security based on watermarking technique
KR101383534B1 (en) Method and apparatus for preventing forgery of multimedia data using timestamp
CN112287367B (en) Automobile T-BOX evidence obtaining system based on trusted computing
Patsakis et al. Privacy-aware event data recorders: cryptography meets the automotive industry again
CN111475865A (en) Automobile data verification method and verification device
US8850198B2 (en) Method for validating a road traffic control transaction
Kurachi et al. Evaluation of automotive event data recorder towards digital forensics
US20210232704A1 (en) Method and system for managing vehicle generated data
Kim et al. Data forgery detection for vehicle black box
US11968312B2 (en) Apparatus and method for cloud-based vehicle data security management
CN113806783B (en) Big data-oriented safety house data protection method and system
US20220166632A1 (en) Apparatus and method for cloud-based vehicle data security management
KR20150064288A (en) Tachograph system of vehicle for ensure the integrity of tachograph data and method thereof
WO2022218205A1 (en) Data transmission method and data processing apparatus
Langer et al. Security analysis of an Event Data Recorder system according to the HEAVENS model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140730

Termination date: 20150830

EXPY Termination of patent right or utility model